State of the art in software verification and witness validation: SV-COMP 2024

D Beyer - International Conference on Tools and Algorithms for …, 2024 - Springer
The 13th edition of the Competition on Software Verification (SV-COMP 2024) was the
largest competition of its kind so far: A total of 76 tools for verification and witness validation …

SecureQwen: Leveraging LLMs for vulnerability detection in python codebases

A Mechri, MA Ferrag, M Debbah - Computers & Security, 2025 - Elsevier
Identifying vulnerabilities in software code is crucial for ensuring the security of modern
systems. However, manual detection requires expert knowledge and is time-consuming …

How secure is AI-generated code: a large-scale comparison of large language models

N Tihanyi, T Bisztray, MA Ferrag, R Jain… - Empirical Software …, 2025 - Springer
This study compares state-of-the-art Large Language Models (LLMs) on their tendency to
generate vulnerabilities when writing C programs using a neutral zero-shot prompt. Tihanyi …

Do neutral prompts produce insecure code? formai-v2 dataset: Labelling vulnerabilities in code generated by large language models

N Tihanyi, T Bisztray, MA Ferrag, R Jain… - arXiv preprint arXiv …, 2024 - arxiv.org
This study provides a comparative analysis of state-of-the-art large language models
(LLMs), analyzing how likely they generate vulnerabilities when writing simple C programs …

AISE: A Symbolic Verifier by Synergizing Abstract Interpretation and Symbolic Execution (Competition Contribution)

Z Wang, Z Chen - International Conference on Tools and Algorithms for …, 2024 - Springer
AISE is a static verifier that can verify the safety properties of C programs. The core of AISE is
a program verification framework that synergizes abstract interpretation and symbolic …

Neural Network Verification is a Programming Language Challenge

LC Cordeiro, ML Daggitt, J Girard-Satabin… - arXiv preprint arXiv …, 2025 - arxiv.org
Neural network verification is a new and rapidly developing field of research. So far, the
main priority has been establishing efficient verification algorithms and tools, while proper …

LLM-Generated Invariants for Bounded Model Checking Without Loop Unrolling

MAA Pirzada, G Reger, A Bhayat… - Proceedings of the 39th …, 2024 - dl.acm.org
We investigate a modification of the classical Bounded Model Checking (BMC) procedure
that does not handle loops through unrolling but via modifications to the control flow graph …

Trust, but Verify: Evaluating Developer Behavior in Mitigating Security Vulnerabilities in Open-Source Software Projects

JO de Sousa, BC De Farias, LC Cordeiro - arXiv preprint arXiv …, 2024 - arxiv.org
This study investigates vulnerabilities in dependencies of sampled open-source software
(OSS) projects, the relationship between these and overall project security, and how …

Verifying Components of Arm® Confidential Computing Architecture with ESBMC

T Wu, S Xiong, E Manino, G Stockwell… - International Static …, 2024 - Springer
Abstract Realm Management Monitor (RMM) is an essential firmware component within the
recent Arm Confidential Computing Architecture (Arm CCA). Previous work applies formal …

Interval Analysis in Industrial-Scale BMC Software Verifiers: A Case Study

RS Menezes, E Manino, F Shmarov… - arXiv preprint arXiv …, 2024 - arxiv.org
Bounded Model Checking (BMC) is a widely used software verification technique. Despite
its successes, the technique has several limiting factors, from state-space explosion to lack …